SlideShare a Scribd company logo
SECURING UNDERWATER WIRELESS
COMMUNICATION NETWORKS
Presented By
Ku. Devyani B. vaidya
OUTLINE
 INTRODUCTION
HISTORY
NECCESITY OF UWCNs
ATTACKS AND COUNTER MEASURES
SECURITY REQUIREMENT
PROPOSED SECURITY MECHANISM
APPLICATIONS OF UWCNs
DISADVANTAGES OF UWCNs
CONCLUSION
REFERENCES
INTRODUCTION
.Underwater wireless communication networks (UWCNs) are constituted
by sensors and autonomous underwater vehicles (AUVs) that interact to
perform specific applications such as underwater monitoring .
 Sensors Nodes are simply nodes energy constrained devices that have
ability of sensing the surrounding environment.
 Sink also known as base station, is a more powerful node that behaves
as an interface between the sensor nodes and the clients.
 Autonomous Underwater Vehicles (AUVS) that interact to perform
specific applications such as underwater monitoring.
HISTORY
 The science of underwater communication began in 1490 when
Leonardo da Vinci stated.
 In 1687 , Issac Newton wrote his Mathematical Principles of Natural
Philosophy which included the first mathematical treatment of sound
of water.
NECESSITY OF UWCNs
Wired underwater is not feasible in all situations as shown below-
 Temporary experiments
 Breaking of wires
 Significant cost of deployment
 Experiment over long distances
 Radio waves do not propagate well underwater due to high energy
absorption of water. Therefore UWCNs are based on acoustic links
characterized by large propagation delay.
 It cannot rely on GPS.
ATTACKS AND COUNTERMEASURES
 Underwater wireless communication networks are particularly vulnerable
to malicious attacks due to the high bit error rates, large and variable
propagation delays and low bandwidth of acoustic channels.
 Several methods are proposed to secure UWCN . Three schemes are there
namely secure time synchronaization, localization and routing in UWCN.
Jamming
Wormh
ole
attacks
Sybil
attack
Selective
Forwardi
ng
Acknowl
edgment
Spoofing
ATTACKS Hello
Flood
attack
Sinkhole
Attacks
ATTACKS AND COUNTER MEASURES
JAMMING
Method of Attack
A jamming attack consists of interfering with the physical channel by putting
up carriers on the frequencies neighbor nodes use to communicate .
Countermeasures
 Spread spectrum techniques
 Sensors can switch to sleep mode
WORMHOLE ATTACK
Methods of Attack
• False neighbourhood relationship
are created.
• The adversary can delay or drop
packets sent through the wormhole.
Countermeasures
 Estimating the direction of arrival by a
wormhole indicator variable.
SINKHOLE ATTACK
Methods of Attack
• A malicious node attempts to attract
traffic from a particular area towards it by
announcing that it is a high quality route.
Countermeasures
 Geographical routing.
 Authentication of nodes exchanging
routing information.
HELLO FLOOD ATTACK
Methods of Attack
• A node receiving a hello packet from a malicious node may interpret that
the adversary is a neighbor node.
Countermeasures
 Bidirectional link verification.
 Authentication is a possible defense.
SELECTIVE FORWARDING
Methods of Attack
• Malicious nodes drop certain messages instead of forwarding
them to hinder routing.
Countermeasures
 Multipath routing.
 Authentication.
Sybil Attack
Methods of Attack
• Sybil attack is defined as a malicious
node illegitimately taking on multiple
identities.
• Attacker with multiple identities
pretend to be in many places at once.
Countermeasures
 Authentication.
 Position verification.
Acknowledgement Spoofing
Methods of Attack
• A malicious node overhearing packets sent to neighbor nodes use the
information to spoof acknowledgements.
Countermeasures
 Encryption of all packets sent through the networks.
SECURITY REQUIREMENT
 Authentication :-Proof that data was sent by a legitimate user.
 Confidentiality:- Information is not accessible to unauthorized
parties.
 Integrity:-Information is not altered.
 Availability:-Data should be available when needed by an authorized
user.
PROPOSED SECURITY MECHANISM
Securing underwater wireless communication :
Secure time synchronization.
Secure localization.
Secure routing.
SECURE TIME SYNCHRONIZATION:
Why is Time Synchronization important ?
 Location and proximity siblings
 Maintain ordering of messages
 Internetwork coordination
 Energy efficiency
SECURE LOCALIZATION:
Why is Localization important ?
 Sensor tasks .
 Making routing decisions .
 The attacker makes the node think it is somewhere different from actual location.As a
result wrong decisions happen.
Secure localization gives the guarantee of correctness despite of
presence of intruders.It is the process for each sensor node to locate its position in the
network.
SECURE ROUTING:
Why is routing important ?
 A sensor routing rejects the routing paths containing malicious
nodes.
 It is specially challenging in UWCNs due to the large propagation
delays,low bandwidth,difficulty of battery refills of underwater
sensors and dynamic topologies.
APPLICATIONS OF
UNDERWATER WIRELESS
COMMUNICATION.
Search and rescue missions under water.
Environmental monitoring to gather oceanographic data.
Marine archaeology
DISADVANTAGES of UWCNs
 Battery power is limited and can not be recharged easily.
 The available bandwidth is severely limited.
 Long and variable propagation delays.
 Multipath and fading problems.
 High bity error rate.
CONCLUSION
 Wireless technology will play a vital role in many application areas that
are not possible in past.
 The main challenges related to secure time synchronization,localization
and routing have been surveyed.
 Since the deployment of the proposed system is still in its development
stage , an account of actual implementation has not been provided in
this paper. The research issues of UWCNs remain wide open for
future investigation.
REFERENCES
 M.C Domingo ,”Securing underwater wireless communication networks”, Journal ,IEEE Wireless Communications archive.
Volume 18 Issue 1, February 2011
 I.F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc
Net., vol. 3, no. 3, Mar. 2005.
 W. Wang et al., “Visualization of Wormholes in Under-water Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3,
no. 1, 2008.
 F. Hu, S. Wilson, and Y. Xiao, “Correlation-Based Security in Time Synchronization of Sensor Networks,” Proc. IEEE WCNC,
2008.
 C. Tian et al., “Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks,”
Proc. IEEE ICC, 2009.
 C. Tian et al., “Localization and Synchronization for 3D Underwater Acoustic Sensor Networks,” in Ubiquitous Intelligence and
Computing, LNCS, Springer, 2007, pp. 622–31.
Underwater wirelesscommunication

More Related Content

PPSX
Securing underwater wireless communication by Nisha Menon K
PPTX
underwater wireless communication by shyam shinde
PPTX
Underwater wireless communication
PPTX
wireless Communication Underwater(Ocean)
PDF
Underwater Wireless Communication”,
PPTX
Underwater wireless communication
PPTX
under water wireless communication
PPTX
Underwater acoustic sensor network
Securing underwater wireless communication by Nisha Menon K
underwater wireless communication by shyam shinde
Underwater wireless communication
wireless Communication Underwater(Ocean)
Underwater Wireless Communication”,
Underwater wireless communication
under water wireless communication
Underwater acoustic sensor network

What's hot (19)

PPTX
Signal processing for underwater acoustic communications
PPTX
UNDER WATER SENSOR NETWORK ENERGY BASED
PPTX
Acoustic communication using ofdm
PDF
Underwater acoustic sensor network
PPTX
underwater communication skills for the new way of devine(2)
PPT
Under Water wireless communication
DOCX
Implementation of Optical wireless communication through underwater channel
PPTX
Underwater acoustic 1
PPTX
Underwater Wireless Communication
PPTX
“Securing underwater wireless communication networks” 2
PPTX
Underwater sensor network
PPTX
underwater wireless communication.
PPTX
RF Based Wireless Under Water Communication
PDF
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
PDF
Project report_new_pdf
DOC
Report underwater-wireless
PPTX
Current developments in underwater autonomy
PPTX
Securing Underwater Wireless Communication
PPT
Underwater channel modelling
Signal processing for underwater acoustic communications
UNDER WATER SENSOR NETWORK ENERGY BASED
Acoustic communication using ofdm
Underwater acoustic sensor network
underwater communication skills for the new way of devine(2)
Under Water wireless communication
Implementation of Optical wireless communication through underwater channel
Underwater acoustic 1
Underwater Wireless Communication
“Securing underwater wireless communication networks” 2
Underwater sensor network
underwater wireless communication.
RF Based Wireless Under Water Communication
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Project report_new_pdf
Report underwater-wireless
Current developments in underwater autonomy
Securing Underwater Wireless Communication
Underwater channel modelling
Ad

Similar to Underwater wirelesscommunication (20)

PPTX
Securing Underwater Wireless Communication Networks.pptxkkkk
PPTX
Securing Underwater Wireless Communication Networks
PDF
Paper id 2520148
PDF
Paper id 2520148 (2)
PPTX
Presentation ACA .pptx
PDF
50120140502016
PDF
Paper id 25201423
PDF
Review on MAC Protocols for underwater acoustic networks
PPTX
shyam shinde
PDF
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
PPTX
Mobile slide
PPTX
Multi-hop Communication for the Next Generation (xG) Wireless Network
PPTX
Underwater Sensor wireless Network
PPTX
Wireless underground sensor networks
PPT
Security and privacy in Wireless Sensor Networks
PPTX
UNDER WATER WIRELESS COMMUNICATION
PDF
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
Fd24967971
PDF
A survey on various time synchronization techniques in underwater sensor netw...
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks
Paper id 2520148
Paper id 2520148 (2)
Presentation ACA .pptx
50120140502016
Paper id 25201423
Review on MAC Protocols for underwater acoustic networks
shyam shinde
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Mobile slide
Multi-hop Communication for the Next Generation (xG) Wireless Network
Underwater Sensor wireless Network
Wireless underground sensor networks
Security and privacy in Wireless Sensor Networks
UNDER WATER WIRELESS COMMUNICATION
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Welcome to International Journal of Engineering Research and Development (IJERD)
Fd24967971
A survey on various time synchronization techniques in underwater sensor netw...
Ad

More from Devyani Vaidya (18)

PPTX
Bigtable a distributed storage system
PPTX
Data warehousing
PPTX
Resource management
PPTX
telephone directory
PPTX
Data as a service
PPTX
Barcode technology
PPTX
Bluetooth secuirty issues
PPTX
Digital locker
PPTX
Fuels saver system
PPTX
Ppt on use of biomatrix in secure e trasaction
PPTX
cloud security ppt
PPTX
Data warehousing
PPTX
Bluetooth secuirty issues
PPTX
3D Password
PPT
3D Password ppt
PPTX
Open and Close Door ppt
PPTX
secued cloud ppt
PPTX
History of Laptops ppt
Bigtable a distributed storage system
Data warehousing
Resource management
telephone directory
Data as a service
Barcode technology
Bluetooth secuirty issues
Digital locker
Fuels saver system
Ppt on use of biomatrix in secure e trasaction
cloud security ppt
Data warehousing
Bluetooth secuirty issues
3D Password
3D Password ppt
Open and Close Door ppt
secued cloud ppt
History of Laptops ppt

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
master seminar digital applications in india
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
01-Introduction-to-Information-Management.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Cell Types and Its function , kingdom of life
PDF
RMMM.pdf make it easy to upload and study
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Pre independence Education in Inndia.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
Basic Mud Logging Guide for educational purpose
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
2.FourierTransform-ShortQuestionswithAnswers.pdf
TR - Agricultural Crops Production NC III.pdf
PPH.pptx obstetrics and gynecology in nursing
Anesthesia in Laparoscopic Surgery in India
master seminar digital applications in india
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
01-Introduction-to-Information-Management.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Cell Types and Its function , kingdom of life
RMMM.pdf make it easy to upload and study
Microbial diseases, their pathogenesis and prophylaxis
Pre independence Education in Inndia.pdf
Renaissance Architecture: A Journey from Faith to Humanism
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
VCE English Exam - Section C Student Revision Booklet
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
human mycosis Human fungal infections are called human mycosis..pptx

Underwater wirelesscommunication

  • 1. SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS Presented By Ku. Devyani B. vaidya
  • 2. OUTLINE  INTRODUCTION HISTORY NECCESITY OF UWCNs ATTACKS AND COUNTER MEASURES SECURITY REQUIREMENT PROPOSED SECURITY MECHANISM APPLICATIONS OF UWCNs DISADVANTAGES OF UWCNs CONCLUSION REFERENCES
  • 3. INTRODUCTION .Underwater wireless communication networks (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring .  Sensors Nodes are simply nodes energy constrained devices that have ability of sensing the surrounding environment.  Sink also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients.  Autonomous Underwater Vehicles (AUVS) that interact to perform specific applications such as underwater monitoring.
  • 4. HISTORY  The science of underwater communication began in 1490 when Leonardo da Vinci stated.  In 1687 , Issac Newton wrote his Mathematical Principles of Natural Philosophy which included the first mathematical treatment of sound of water.
  • 5. NECESSITY OF UWCNs Wired underwater is not feasible in all situations as shown below-  Temporary experiments  Breaking of wires  Significant cost of deployment  Experiment over long distances  Radio waves do not propagate well underwater due to high energy absorption of water. Therefore UWCNs are based on acoustic links characterized by large propagation delay.  It cannot rely on GPS.
  • 6. ATTACKS AND COUNTERMEASURES  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays and low bandwidth of acoustic channels.  Several methods are proposed to secure UWCN . Three schemes are there namely secure time synchronaization, localization and routing in UWCN.
  • 8. JAMMING Method of Attack A jamming attack consists of interfering with the physical channel by putting up carriers on the frequencies neighbor nodes use to communicate . Countermeasures  Spread spectrum techniques  Sensors can switch to sleep mode
  • 9. WORMHOLE ATTACK Methods of Attack • False neighbourhood relationship are created. • The adversary can delay or drop packets sent through the wormhole. Countermeasures  Estimating the direction of arrival by a wormhole indicator variable.
  • 10. SINKHOLE ATTACK Methods of Attack • A malicious node attempts to attract traffic from a particular area towards it by announcing that it is a high quality route. Countermeasures  Geographical routing.  Authentication of nodes exchanging routing information.
  • 11. HELLO FLOOD ATTACK Methods of Attack • A node receiving a hello packet from a malicious node may interpret that the adversary is a neighbor node. Countermeasures  Bidirectional link verification.  Authentication is a possible defense.
  • 12. SELECTIVE FORWARDING Methods of Attack • Malicious nodes drop certain messages instead of forwarding them to hinder routing. Countermeasures  Multipath routing.  Authentication.
  • 13. Sybil Attack Methods of Attack • Sybil attack is defined as a malicious node illegitimately taking on multiple identities. • Attacker with multiple identities pretend to be in many places at once. Countermeasures  Authentication.  Position verification.
  • 14. Acknowledgement Spoofing Methods of Attack • A malicious node overhearing packets sent to neighbor nodes use the information to spoof acknowledgements. Countermeasures  Encryption of all packets sent through the networks.
  • 15. SECURITY REQUIREMENT  Authentication :-Proof that data was sent by a legitimate user.  Confidentiality:- Information is not accessible to unauthorized parties.  Integrity:-Information is not altered.  Availability:-Data should be available when needed by an authorized user.
  • 16. PROPOSED SECURITY MECHANISM Securing underwater wireless communication : Secure time synchronization. Secure localization. Secure routing.
  • 17. SECURE TIME SYNCHRONIZATION: Why is Time Synchronization important ?  Location and proximity siblings  Maintain ordering of messages  Internetwork coordination  Energy efficiency
  • 18. SECURE LOCALIZATION: Why is Localization important ?  Sensor tasks .  Making routing decisions .  The attacker makes the node think it is somewhere different from actual location.As a result wrong decisions happen. Secure localization gives the guarantee of correctness despite of presence of intruders.It is the process for each sensor node to locate its position in the network.
  • 19. SECURE ROUTING: Why is routing important ?  A sensor routing rejects the routing paths containing malicious nodes.  It is specially challenging in UWCNs due to the large propagation delays,low bandwidth,difficulty of battery refills of underwater sensors and dynamic topologies.
  • 21. Search and rescue missions under water.
  • 22. Environmental monitoring to gather oceanographic data.
  • 24. DISADVANTAGES of UWCNs  Battery power is limited and can not be recharged easily.  The available bandwidth is severely limited.  Long and variable propagation delays.  Multipath and fading problems.  High bity error rate.
  • 25. CONCLUSION  Wireless technology will play a vital role in many application areas that are not possible in past.  The main challenges related to secure time synchronization,localization and routing have been surveyed.  Since the deployment of the proposed system is still in its development stage , an account of actual implementation has not been provided in this paper. The research issues of UWCNs remain wide open for future investigation.
  • 26. REFERENCES  M.C Domingo ,”Securing underwater wireless communication networks”, Journal ,IEEE Wireless Communications archive. Volume 18 Issue 1, February 2011  I.F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc Net., vol. 3, no. 3, Mar. 2005.  W. Wang et al., “Visualization of Wormholes in Under-water Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3, no. 1, 2008.  F. Hu, S. Wilson, and Y. Xiao, “Correlation-Based Security in Time Synchronization of Sensor Networks,” Proc. IEEE WCNC, 2008.  C. Tian et al., “Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks,” Proc. IEEE ICC, 2009.  C. Tian et al., “Localization and Synchronization for 3D Underwater Acoustic Sensor Networks,” in Ubiquitous Intelligence and Computing, LNCS, Springer, 2007, pp. 622–31.